The Command Linehttps://thecommandline.net
Exploring digital citizenry as a creator and a consumer.Sun, 13 Jan 2019 17:55:59 +0000en-UShourly1https://wordpress.org/?v=5.0.3https://thecommandline.net/files/favicon.pngThe Command Linehttps://thecommandline.net
3232How systems change explains why some actors in the public policy space are more effectivehttps://thecommandline.net/2018/01/08/how-systems-change-explains-why-some-actors-in-the-public-policy-space-are-more-effective/
https://thecommandline.net/2018/01/08/how-systems-change-explains-why-some-actors-in-the-public-policy-space-are-more-effective/#commentsMon, 08 Jan 2018 16:49:17 +0000https://thecommandline.net/?p=9269Read More ...]]>This article from Stanford has helped me understand why some of my colleagues when I worked directly on public policy were consistently more effective. My own insights about coalition building and using connections well really snapped into much clearer focus after reading this article.

A growing number of philanthropists and nonprofits are embracing the principles of systems change as an effective way to solve the world’s biggest problems.

]]>https://thecommandline.net/2018/01/08/how-systems-change-explains-why-some-actors-in-the-public-policy-space-are-more-effective/feed/1Schumer wants to use CRA to undo net neutrality repealhttps://thecommandline.net/2017/12/18/schumer-wants-to-use-cra-to-undo-net-neutrality-repeal/
https://thecommandline.net/2017/12/18/schumer-wants-to-use-cra-to-undo-net-neutrality-repeal/#commentsMon, 18 Dec 2017 18:45:59 +0000https://thecommandline.net/?p=9266Read More ...]]>Jon Brodkin at Ars Technica as ever explains clearly how using the CRA to undo the FCC vote could work as well as the political likelihood of such an action succeeding. Part of me likes open internet supporters in Congress using the same act to preserve existing neutrality rules that was also used to undo consumer privacy protections earlier in the year. Another part of me wishes legislators would get on with what I think is really needful: a new piece of legislation to establish clear regulatory authority and constraints that is far better in step with the reality of the Internet than decades old telecom law.

]]>https://thecommandline.net/2017/12/18/schumer-wants-to-use-cra-to-undo-net-neutrality-repeal/feed/1One Reason I am Increasingly Struggling to Speak about Tech Policyhttps://thecommandline.net/2017/12/18/one-reason-i-am-increasingly-struggling-to-speak-about-tech-policy/
https://thecommandline.net/2017/12/18/one-reason-i-am-increasingly-struggling-to-speak-about-tech-policy/#commentsMon, 18 Dec 2017 16:48:55 +0000https://thecommandline.net/?p=9263Read More ...]]>Technology policy is hard to follow for the interested and invested. It is harder for a blogger and podcaster like me who wants in some way to make the legitimately complex issues in some way more understandable, to hopefully increase the number of people engaged in the very important, public discourse around these policy matters.

Mike Masnick at Techdirt unpacks a bit of Internet outrage around yet another tone deaf move by current FCC chair Pai. The sentiment that I think best sums up a piece that still is definitely worth the read is rightly angry but for the wrong reasons.

Why this is demotivating to me, on top of an an unrelated and overall lower energy level lately for all things technology lately, is that it makes the actual policy work so much harder. Signals from the public like open protests and calls to representatives are a very important contribution. However, when the rationale expressed in them is off base, if fuels exactly the kind of disregard that was critical to Pai and his supported in rolling back the rules around Network Neutrality.

]]>https://thecommandline.net/2017/12/18/one-reason-i-am-increasingly-struggling-to-speak-about-tech-policy/feed/1Glowing Recommendation of O’Reilly’s New Bookhttps://thecommandline.net/2017/12/04/glowing-recommendation-of-oreillys-new-book/
https://thecommandline.net/2017/12/04/glowing-recommendation-of-oreillys-new-book/#respondMon, 04 Dec 2017 17:30:52 +0000https://thecommandline.net/?p=9257Read More ...]]>I had the great pleasure to see Tim O’Reilly speak in person at an open government event I attended years ago. Everything Cory relates in his expansive and glowing review of O’Reilly’s new book both rings true and makes for a compelling endorsement. This seems like a book that is both a bit overdue and very much primed for this particular moment.

]]>https://thecommandline.net/2017/12/04/glowing-recommendation-of-oreillys-new-book/feed/0Firefox adopts technique from Tor to blunt browser fingerprintinghttps://thecommandline.net/2017/10/31/firefox-adopts-technique-from-tor-to-blunt-browser-fingerprinting/
https://thecommandline.net/2017/10/31/firefox-adopts-technique-from-tor-to-blunt-browser-fingerprinting/#respondTue, 31 Oct 2017 21:43:17 +0000https://thecommandline.net/?p=9252Read More ...]]>The change, to curtail access to the Canvas API, is incremental and likely to be limited in how it is visible to regular users. However it signals some progress in a collaboration with the Tor project to incorporate code and ideas that benefit the privacy features of Firefox and Tor Browser. The Register’s write up includes a pretty good explainer on fingerprinting and why finding ways to mitigate it is important.

]]>https://thecommandline.net/2017/10/31/firefox-adopts-technique-from-tor-to-blunt-browser-fingerprinting/feed/0Google’s reCaptcha cracked againhttps://thecommandline.net/2017/10/31/googles-recaptcha-cracked-again/
https://thecommandline.net/2017/10/31/googles-recaptcha-cracked-again/#commentsTue, 31 Oct 2017 21:35:55 +0000https://thecommandline.net/?p=9249Read More ...]]>A couple of important points here. What was theoretically broken was the audio alternative option in reCaptcha. Bad but not as bad as it could be. What is probably worse, though, is that an exploit has been previously published of this same option, in fact using Google’s own voice processing API’s against it. Nothing about how Google can or will shore up this vulnerability.

Google’s reCaptcha service has been cracked by researchers who devised an automated attack called unCaptcha that can break the service with 85 percent accuracy.

]]>https://thecommandline.net/2017/10/31/googles-recaptcha-cracked-again/feed/1Deputy AG shows law enforcers still don’t get encryptionhttps://thecommandline.net/2017/10/31/deputy-ag-shows-law-enforcers-still-dont-get-encryption/
https://thecommandline.net/2017/10/31/deputy-ag-shows-law-enforcers-still-dont-get-encryption/#commentsTue, 31 Oct 2017 17:46:21 +0000https://thecommandline.net/?p=9244Read More ...]]>According to The Register, the US Deputy Attorney General is now saying that technology companies don’t need to install back doors in their encryption–provided they can reveal plain text of all secure communications on demand. Entirely misses the point.

]]>https://thecommandline.net/2017/10/31/deputy-ag-shows-law-enforcers-still-dont-get-encryption/feed/4Flaw in Google bug tracker exposed reports about unpatched vulnerabilitieshttps://thecommandline.net/2017/10/31/flaw-in-google-bug-tracker-exposed-reports-about-unpatched-vulnerabilities/
https://thecommandline.net/2017/10/31/flaw-in-google-bug-tracker-exposed-reports-about-unpatched-vulnerabilities/#commentsTue, 31 Oct 2017 17:39:22 +0000https://thecommandline.net/?p=9241Read More ...]]>I am surprised we haven’t seen this kind of thing previously. No doubt it has happened before given the value to attackers of this kind of information. The issue was found by a bug hunter as part of Google’s bounty program. Good for them to include the infrastructure for their program as well as Google products and services.

Google’s Issue Tracker contained until recently a vulnerability that would allow an external party access to any unpatched bug listed and described in the database.

]]>https://thecommandline.net/2017/10/31/flaw-in-google-bug-tracker-exposed-reports-about-unpatched-vulnerabilities/feed/1FCC chair’s battles extend beyond net neutralityhttps://thecommandline.net/2017/10/30/fcc-chairs-battles-extend-by-net-neutrality/
https://thecommandline.net/2017/10/30/fcc-chairs-battles-extend-by-net-neutrality/#respondMon, 30 Oct 2017 20:25:00 +0000https://thecommandline.net/?p=9237Read More ...]]>Wherever you may fall on the budget concerns of an uncapped program like Lifeline, Jon Brodkin’s piece contains enough to worry about in terms of Pai’s continuing dismantling of his predecessors service to the public interest. Re-raising the bar on ISPs wanting to offer subsidized service, regardless of the cap issue, clearly says a lot about Pai’s stance of meaningful adoption and access.

Pai proposes Lifeline budget cap and new limits on which ISPs can get subsidies.

]]>https://thecommandline.net/2017/10/30/fcc-chairs-battles-extend-by-net-neutrality/feed/0Lessons for technologists from historical resistancehttps://thecommandline.net/2017/10/30/lessons-for-technologists-from-historical-resistance/
https://thecommandline.net/2017/10/30/lessons-for-technologists-from-historical-resistance/#commentsMon, 30 Oct 2017 16:02:24 +0000https://thecommandline.net/?p=9234Read More ...]]>This piece Cory shares works on a couple of levels. 1st is the simple history of how tech workers interfered with the Nazis, a theme that reminds me in all the best ways of the history and historical fiction I have read around WWII code making and breaking efforts. Perhaps more importantly, here, Cory shares a plea for modern tech workers to consider what they can do to help protect those at most risk in ways similar to our historical antecedents, translated forward to today.

How the tech workers of WWII thwarted the Nazis with high-tech sabotage

]]>https://thecommandline.net/2017/10/30/lessons-for-technologists-from-historical-resistance/feed/1FBI still arguing for “responsible encryption”https://thecommandline.net/2017/10/30/fbi-still-arguing-for-responsible-encryption/
https://thecommandline.net/2017/10/30/fbi-still-arguing-for-responsible-encryption/#commentsMon, 30 Oct 2017 15:57:22 +0000https://thecommandline.net/?p=9231Read More ...]]>Why is this still a thing? There is no such thing as encryption only law enforcers can bypass. The math and computer science on this is pretty well settled, not to mention the terrifying unintended consequences that would be unleashed should the FBI should get its wish. Thankfully, EFF is still on top of this, as Kurt Opsahl does the usual solid analysis taking this to task and taking it apart.

]]>https://thecommandline.net/2017/10/30/fbi-still-arguing-for-responsible-encryption/feed/32017-10-22 The Command Line Podcasthttps://thecommandline.net/2017/10/22/2017-10-22-the-command-line-podcast/
https://thecommandline.net/2017/10/22/2017-10-22-the-command-line-podcast/#commentsSun, 22 Oct 2017 21:55:17 +0000https://thecommandline.net/?p=9197Read More ...]]>This is an episode of The Command Line Podcast.

I talk about the practice of code review, especially when it is challenging.

]]>https://thecommandline.net/2017/10/22/2017-10-22-the-command-line-podcast/feed/32017-10-01 The Command Line Podcasthttps://thecommandline.net/2017/10/01/2017-10-01-the-command-line-podcast/
https://thecommandline.net/2017/10/01/2017-10-01-the-command-line-podcast/#commentsSun, 01 Oct 2017 22:51:40 +0000https://thecommandline.net/?p=9194Read More ...]]>This is an episode of The Command Line Podcast.

I mentioned my new podcasting project for which I have set up a Patreon if you are interested, it will be an interview driven podcast about beer.

In the feature for this episode, I reflect on my experiences being mentored and as a mentor.

]]>https://thecommandline.net/2017/10/01/2017-10-01-the-command-line-podcast/feed/12017-09-10 The Command Line Podcasthttps://thecommandline.net/2017/09/10/2017-09-10-the-command-line-podcast/
https://thecommandline.net/2017/09/10/2017-09-10-the-command-line-podcast/#commentsSun, 10 Sep 2017 15:52:35 +0000https://thecommandline.net/?p=9186Read More ...]]>This is an episode of The Command Line Podcast.

]]>https://thecommandline.net/2017/09/10/2017-09-10-the-command-line-podcast/feed/32017-08-20 The Command Line Podcasthttps://thecommandline.net/2017/08/20/2017-08-20-the-command-line-podcast/
https://thecommandline.net/2017/08/20/2017-08-20-the-command-line-podcast/#commentsSun, 20 Aug 2017 20:56:44 +0000https://thecommandline.net/?p=9180Read More ...]]>This is an episode of The Command Line Podcast.

]]>https://thecommandline.net/2017/08/20/2017-08-20-the-command-line-podcast/feed/12017-08-06 The Command Line Podcasthttps://thecommandline.net/2017/08/06/2017-08-06-the-command-line-podcast/
https://thecommandline.net/2017/08/06/2017-08-06-the-command-line-podcast/#commentsSun, 06 Aug 2017 20:40:34 +0000https://thecommandline.net/?p=9173Read More ...]]>This is an episode of The Command Line Podcast.

I unpack some of my own experiences of the evolutionary trend that has results in Docker.

]]>https://thecommandline.net/2017/08/06/2017-08-06-the-command-line-podcast/feed/3Congress invites key players to net neutrality hearinghttps://thecommandline.net/2017/07/25/congress-invites-key-players-to-net-neutrality-hearing/
https://thecommandline.net/2017/07/25/congress-invites-key-players-to-net-neutrality-hearing/#commentsTue, 25 Jul 2017 21:21:01 +0000https://thecommandline.net/?p=9170Read More ...]]>Far too early to guess how this may play out. Should it lead to new legislation, for good or for ill, the back and forth at the FCC will effectively be ended. That means the stakes are pretty high. No idea if the fact it is a Republican calling for this discussion means their agenda would more likely inform any outcome, plus there are some very strong neutrality supporters among them, in particular Wyden and Issa.

]]>https://thecommandline.net/2017/07/25/congress-invites-key-players-to-net-neutrality-hearing/feed/1Incredibly detailed history of notional crypto users, Alice and Bobhttps://thecommandline.net/2017/07/24/incredibly-detailed-history-of-notional-crypto-users-alice-and-bob/
https://thecommandline.net/2017/07/24/incredibly-detailed-history-of-notional-crypto-users-alice-and-bob/#respondMon, 24 Jul 2017 15:01:32 +0000https://thecommandline.net/?p=9167Read More ...]]>Not surprising that they originate from an RSA paper on public key cryptography. This site has way more than the early history, though, explaining how the set of notional actors has been expanded and adopted in other example narratives.

h/t Boing Boing

A History of Alice and Bob, by Quinn DuPont and Alana Cattapan (created 2017).

]]>https://thecommandline.net/2017/07/24/incredibly-detailed-history-of-notional-crypto-users-alice-and-bob/feed/0MIT working to make custom chips for AI more attractive for mobilehttps://thecommandline.net/2017/07/24/mit-working-to-make-custom-chips-for-ai-more-attractive-for-mobile/
https://thecommandline.net/2017/07/24/mit-working-to-make-custom-chips-for-ai-more-attractive-for-mobile/#respondMon, 24 Jul 2017 14:53:06 +0000https://thecommandline.net/?p=9164Read More ...]]>This reminds me of other research I’ve read about over the years to add other kinds of custom processors into the many core mix that is now prevalent even on mobile devices. This story isn’t even about creating a custom chip for neural networks but improving their power efficiency to make them more adoptable on phones.

]]>https://thecommandline.net/2017/07/24/mit-working-to-make-custom-chips-for-ai-more-attractive-for-mobile/feed/02017-07-23 The Command Line Podcasthttps://thecommandline.net/2017/07/23/2017-07-23-the-command-line-podcast/
https://thecommandline.net/2017/07/23/2017-07-23-the-command-line-podcast/#commentsSun, 23 Jul 2017 21:01:45 +0000https://thecommandline.net/?p=9161Read More ...]]>This is an episode of The Command Line Podcast.

I talk about the how frustration can be effectively channeled by building surprising tools, for yourself and your fellow developers.

]]>https://thecommandline.net/2017/07/23/2017-07-23-the-command-line-podcast/feed/1Unix predecessor resurrected in a simulatorhttps://thecommandline.net/2017/07/10/unix-predecessor-resurrected-in-a-simulator/
https://thecommandline.net/2017/07/10/unix-predecessor-resurrected-in-a-simulator/#commentsMon, 10 Jul 2017 16:41:19 +0000https://thecommandline.net/?p=9158Read More ...]]>Literally living history. Multics was was a critical antecedent to Unix and an early touchstone of hacker history.

]]>https://thecommandline.net/2017/07/10/unix-predecessor-resurrected-in-a-simulator/feed/1Thorough primer on threat modelinghttps://thecommandline.net/2017/07/10/thorough-primer-on-threat-modeling/
https://thecommandline.net/2017/07/10/thorough-primer-on-threat-modeling/#respondMon, 10 Jul 2017 16:34:07 +0000https://thecommandline.net/?p=9155Read More ...]]>Sean Gallagher at Ars does an admirable job of breaking down a security topic, threat modeling, that doesn’t get much attention outside of research and professional circles. This piece is a long read but well worth it, both to understand the tecnique and for all the references and practical advice.

Reducing privacy and security risks starts with knowing what the threats really are.

]]>https://thecommandline.net/2017/07/10/thorough-primer-on-threat-modeling/feed/02017-07-09 The Command Line Podcasthttps://thecommandline.net/2017/07/09/2017-07-09-the-command-line-podcast/
https://thecommandline.net/2017/07/09/2017-07-09-the-command-line-podcast/#respondSun, 09 Jul 2017 16:36:22 +0000https://thecommandline.net/?p=9152Read More ...]]>This is an episode of The Command Line Podcast.

I talk about the trade offs between dedicating to a single programming language or stack and embracing being a programming polyglot.

]]>https://thecommandline.net/2017/07/07/w3c-pushes-forward-drm-standard-despite-all-objections/feed/1Let’s Encrypt to offer wildcard certificates for freehttps://thecommandline.net/2017/07/06/lets-encrypt-to-offer-wildcard-certificates-for-free/
https://thecommandline.net/2017/07/06/lets-encrypt-to-offer-wildcard-certificates-for-free/#commentsThu, 06 Jul 2017 18:43:16 +0000https://thecommandline.net/?p=9146Read More ...]]>After only a year with a paid authority, I gladly switched to the free and open certificate authority that EFF helped stand up. I haven’t minded having to enter multiple alternative names on my certificate every time I renew (which is evert 90 days, a security feature of Let’s Encrypt.) Wildcards make an already fantastic resource that much better.

]]>https://thecommandline.net/2017/07/06/lets-encrypt-to-offer-wildcard-certificates-for-free/feed/1Copyright Office recommends permanently legalizing right to repairhttps://thecommandline.net/2017/06/26/copyright-office-recommends-permanently-legalizing-right-to-repair/
https://thecommandline.net/2017/06/26/copyright-office-recommends-permanently-legalizing-right-to-repair/#commentsMon, 26 Jun 2017 17:06:36 +0000https://thecommandline.net/?p=9137Read More ...]]>Jason Koebler’s write up at Motherboard explains that the Copyright Office is essentially tired of granting the same exemption to the DMCA’s anti-circumvention clause for the right to repair locked down devices. If adopted, this would be a substantial win for copyright reform and suggests that the increasing activity in petitions for exemptions every three years could lead to further permanent reforms. Here’s to hoping.

h/t Slashdot

“The Office recommends against limiting an exemption to specific technologies or devices.”

]]>https://thecommandline.net/2017/06/26/copyright-office-recommends-permanently-legalizing-right-to-repair/feed/32017-06-25 The Command Line Podcasthttps://thecommandline.net/2017/06/25/2017-06-25-the-command-line-podcast/
https://thecommandline.net/2017/06/25/2017-06-25-the-command-line-podcast/#commentsSun, 25 Jun 2017 19:36:36 +0000https://thecommandline.net/?p=9134Read More ...]]>This is an episode of The Command Line Podcast.

A long overdue episode on Internet exceptionalism and radical acceptance.

]]>https://thecommandline.net/2017/06/25/2017-06-25-the-command-line-podcast/feed/1Building quantum registers from imperfect crystalshttps://thecommandline.net/2017/06/20/building-quantum-registers-from-imperfect-crystals/
https://thecommandline.net/2017/06/20/building-quantum-registers-from-imperfect-crystals/#commentsTue, 20 Jun 2017 16:55:48 +0000https://thecommandline.net/?p=9122Read More ...]]>Chris Lee at Ars explains some new research that could fill in a critical piece needed for a practical quantum computer, a way of storing multiple qubits similar to a register in a classical computer so more sophisticated computation and communication can be realized. Lee does his usual excellent job of making what can be a pretty opaque topic very readable, especially how this likely informs future applications.

Photons store themselves in ions that bob up and down in a sea of light.

]]>https://thecommandline.net/2017/06/20/building-quantum-registers-from-imperfect-crystals/feed/1SCOTUS turns down dancing baby DMCA casehttps://thecommandline.net/2017/06/20/scotus-turns-down-dancing-baby-dmca-case/
https://thecommandline.net/2017/06/20/scotus-turns-down-dancing-baby-dmca-case/#respondTue, 20 Jun 2017 16:44:28 +0000https://thecommandline.net/?p=9119Read More ...]]>An unfortunate update explained well by Joe Mullin at Ars. Some useful background, too, as well as the question of whether EFF will proceed with a jury trial.

]]>https://thecommandline.net/2017/06/20/scotus-turns-down-dancing-baby-dmca-case/feed/0Solid advice on writing an effective comment to the FCC on net neutralityhttps://thecommandline.net/2017/06/19/solid-advice-on-writing-an-effective-comment-to-the-fcc-on-net-neutrality/
https://thecommandline.net/2017/06/19/solid-advice-on-writing-an-effective-comment-to-the-fcc-on-net-neutrality/#respondMon, 19 Jun 2017 16:27:32 +0000https://thecommandline.net/?p=9116Read More ...]]>Jon Brodkin at Ars leavens his coverage of the fight for network neutrality with this advice on writing a good comment to the FCC. He features suggestions from Gigi Sohn, long time and respected fixture of the DC technology policy world.

Former FCC official explains how to get your point across to Ajit Pai.